permissions 中文意思是什麼

permissions 解釋
使用權限
  1. File permissions and acls can be monitored and fixed

    可以監控和修改文件許可權和acl 。
  2. Establish permissions on the build machine

    建立生成計算機權限。
  3. Code - centric authorization access permissions as typed objects

    以代碼為中心的授權
  4. Connect to the oracle publisher with dba permissions

    用dba權限連接到oracle發布服務器。
  5. Each type of permission clearly defines extreme states representing either all or none of the permissions expressible within the type

    每個權限類型均明確定義了極端的狀態,表示該類型中可表現的所有權限或沒有任何權限。
  6. Audit server scope gdr event class occurs when a grant, revoke, or deny is issued for permissions in the server scope, such as creating a login

    當為了獲取服務器范圍內的權限(例如,創建登錄名)而發出grant 、 revoke或deny時,會產生
  7. Audit database scope gdr event class occurs whenever a grant, revoke, or deny is issued for a statement permission by any user in microsoft sql server for database - only actions such as granting permissions on a database

    每當microsoft sql server中的用戶發出針對語句權限的grant 、 revoke或deny時(僅限於數據庫操作,例如針對某個數據庫授予權限) ,都會發生
  8. The grantee effectively has all defined permissions on the securable

    被授權者實際上對安全對象具有所定義的所有權限。
  9. Server - principal - id of the grantor of these permissions

    這些權限的授權者的服務器主體id 。
  10. Database principal id of the grantor of these permissions

    這些權限的授權者的數據庫主體id 。
  11. For example, in earlier versions of sql server, the permissions associated with a grantor or grantee is stored in a single row as a bitmap

    例如,在早期版本的sql server中,與授權者或被授權者關聯的權限作為位圖存儲在一行中。
  12. Deny typically takes precedence over other permissions

    Deny通常優先於其他權限。
  13. Setting run time permissions on remote iis web sites

    設置遠程iis網站的運行時權限
  14. Grants permissions on a securable to a principal

    將安全對象的權限授予主體。
  15. Identity permissions help protect code from unauthorized access

    從同一基類派生。
  16. The typical solution is to use a directory for which the permissions don t allow unprivileged programs to add or remove files at all

    典型的解決方案是使用一個目錄,使該目錄的權限根本不允許未經授權的程序添加或者刪除文件。
  17. When you build an assembly, you can specify a set of permissions that the assembly requires to run

    在您生成程序集時,您可以指定該程序集運行所需的一組權限。
  18. Additionally, users can run permview. exe to determine the permissions an assembly requires to execute

    另外,用戶可以運行permview . exe來確定程序集要求的執行權限。
  19. After the user is authenticated, the report server checks for permissions that authorize access to report server content and operations

    也可以將報表服務器配置為使用一組特定的憑據。
  20. Any extra permission you added has two icons in the included column : the normal checkmark, which all included permissions have, and an additional icon, which looks like a balloon containing the letter " i "

    您添加的任何額外權限在「包括」列中有兩個圖標:一個是正常的選中標記,所有包括的權限都有該標記;另一個是附加圖標,看上去像一個含有字母「 i 」的氣球。
分享友人